Skip to main content
Log in

Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cloud computing is the developing design of IT enterprise. Applications and the services that are present over the Internet are referred by the cloud computing. Critical issues on security and trust based are often a major problem in cloud computing. Different levels of security enforcement are offered by both public and private clouds. Auditing plays a vital role in evaluating an individual, process, system, product or an enterprise. A renaissance system model has been proposed for secure data storage in cloud. The proposed model involves four entities: Data owners, the cloud, cloud service provider and third party auditor (TPA). The TPA has the ability to create the awareness in order to bring out the public audits in the cloud having the coded data. The outcome seems to be trusted and is impartial for both the cloud servers and the data owners. The proposed model is a semi trusted proxy agent that performances instead of the data owner in order to reinstate the data blocks that are obtained during the repair process. Renaissance system model is proposed and implemented into the test bed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Dimakis, A. G., Ramchandran, K., Wu, Y., & Suh, C. (2011). A survey on network codes for distributed storage. Proceedings of the IEEE, 99(3), 476–489.

    Article  Google Scholar 

  2. Lopez, J. M., Ruebsamen, T., & Westhoff, D. (2014). Privacy-friendly cloud audits with somewhat homomorphic and searchable encryption. Hochschule Furtwangen University Furtwangen, Germany.

  3. Hwang, K., Fox, G., & Dongarra, J. (2010). Distributed systems and cloud computing: Clusters, Grids/P2P, and Internet Clouds. Burlington: Morgan Kaufmann.

    Google Scholar 

  4. Chen, B., Curtmola, R., Ateniese, G., & Burns, R. (2010). Remote data checking for network coding-based distributed storage systems. In Proceedings of the 2010 ACM workshop on cloud computing security workshop (pp. 31–42). ACM.

  5. Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE (pp. 1–9). IEEE.

  6. Kuyoro, S. O., Ibikunle, F., & Awodele, O. (2011). Cloud Computing security issues and challenges. International Journal of Computer Networks, 3(5), 247–255.

    Google Scholar 

  7. Ateniese, G., Di Pietro, R., Mancini, L. V., & Tsudik, G. (2008). Scalable and efficient provable data possession. In Proceedings of the 4th international conference on Security and privacy in communication networks. ACM.

  8. Bugiel, S., Nurnberger, S., Sadeghi, A.-R., & Schneider, T. (2011). Twin clouds: Secure cloud computing with low latency. Germany: CASED.

    Google Scholar 

  9. Chen, H., & Lee, P. (2014). Enabling data integrity protection in regenerating-coding-based cloud storage: Theory and implementation. IEEE Transactions on Parallel and Distributed Systems, 25(2), 407–416.

    Article  Google Scholar 

  10. Li, L., Xu, L., Li, J., & Zhang, C. (2011). Study on the third-party audit in cloud storage service. In International conference on cloud and service computing.

  11. Hwang, K., Kulkarni, S., & Hu, Y. (2009). Cloud security with virtualized defense and reputation-based trust management. In IEEE Int’l conference dependable, autonomic, and secure computing (DASC 09), IEEE CS Press.

  12. Parwekar, P., Kumar, P., Saxena, M., & Saxena, S. (2014). Public auditing: Cloud data storage. In International conference on 5th 2014.

  13. Li, X., Li, W., & Shi, D. (2015). Enterprise private cloud file encryption system based on tripartite secret key protocol. In International industrial informatics and computer engineering conference (pp. 166–169). Atlantis Press.

  14. Li, M., Yu, S., Ren, K., & Lou, W. (2010). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In Security and privacy in communication networks, proceedings of 6th international. conference on security privacy communication network.

  15. Wang, C., Chow, S. S. M., Wang, Q., Ren, K., & Lou, W. (2013). Privacy preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.

    Article  MathSciNet  Google Scholar 

  16. Nick, J. (2010). Journey to the private cloud: Security and compliance. Tech. presentation, EMC, Tsinghua Univ., 25 May 2010.

  17. Ye, C., & Reznik, A. (2007). Inter digital communications corporation King of Prussia. Group Secret Key Generation Algorithms 0701124v1 19 Jan 2007.

  18. Catteddu, D., & Hogben, G. (2009). Cloud computing: Benefits, risks and recommendations for information security. European Network and Information Security Agency (ENISA), Cete.

  19. Yang, K., & Jia, X. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 24(9), 1717–1726.

    Article  Google Scholar 

  20. Yu, J., Ren, K., Wang, C., & Varsdharajan, V. (2015). Enabling cloud storage auditing with key exposure resistance. IEEE Transaction on Information Forensics and Security, 10(6), 1167–1179.

  21. Nafi, K. W., Kar, T. S., Hoque, S. A., & Hashem, M. M. A. (2012). A newer user authentication, file encryption and distributed server based cloud computing security architecture. International Journal of Advanced Computer Science and Applications, 3(10), 181–186.

    Google Scholar 

  22. Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In Proceedings of international conference on the theory and application of cryptology and information security (ASIACRYPT), 2008 (pp. 90–107).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Loheswaran.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Loheswaran, K., Premalatha, J. Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing. Wireless Pers Commun 90, 1051–1066 (2016). https://doi.org/10.1007/s11277-016-3296-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3296-7

Keywords

Navigation